10 ENGLISH BOOKS RELATING TO «ROOTKIT»
Discover the use of
rootkit in the following bibliographical selection. Books relating to
rootkit and brief extracts from same to provide context of its use in English literature.
1
The
Rootkit Arsenal: Escape and Evasion
Adopting an approach that favors full disclosure, The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology. This book covers more topics, in greater depth, than any other currently available.
2
Rootkits: Subverting the Windows Kernel
Rootkit.com founder reveals never-before-told offensive aspects of rootkit technology.
Greg Hoglund, James Butler, 2006
3
The
Rootkit Arsenal: Escape and Evasion in the Dark Corners ...
This Book Covers More Topics, In Greater Depth, Than Any Other Currently Available.
But never fear — this book reveals their ugly secrets and shows you exactly how to identify them, yank them out, repair the damage they've done, and set up defenses to keep new ones from taking root in your system.
Larry Stevenson, Nancy Altholz, 2006
5
The
Rootkit Arsenal: Escape and Evasion in the Dark Corners ...
This book covers more topics, in greater depth, than any other currently available.
6
Windows Forensic Analysis DVD Toolkit
To put our netstat example in the context of a user-mode rootkit, rather than
replacing the netstat command itself, a user-mode rootkit will hook Windows API
function calls so that the functions themselves do not return a complete listing of
all ...
7
Managed Code Rootkits: Hooking into Runtime Environments
Management development scenarios, tools like ReFrameworker, and countermeasures are covered, making this book a one stop shop for this new attack vector.
8
Security Awareness: Applying Practical Security in Your World
When and how should I install Windows patches? This text is designed to help students understand the answers to these questions through a series of real-life user experiences.
9
Penetration Tester's Open Source Toolkit
This was, of course, a rootkit. Specifically, it was a variant on TDSS and was used
to compromise a number of systems. 4.3.2.1.4 Status Many people use social
networks to provide status updates on what they're doing on a day-to-day or ...
This book provides the detailed, step-by-step instructions and examples required to produce full-featured, robust rootkits.
10 NEWS ITEMS WHICH INCLUDE THE TERM «ROOTKIT»
Find out what the national and international press are talking about and how the term
rootkit is used in the context of the following news items.
Hacking Team's malware uses a UEFI rootkit to survive operating …
Trend Micro found details about the UEFI rootkit in the more than 400GB worth of files and emails that were leaked recently from Milan-based Hacking Team by ... «PCWorld, Jul 15»
Proof-of-concept rootkit proves malware can hide on graphics chips
A team of anonymous developers who recently created a Linux rootkit that runs on graphics cards has released a new proof-of-concept malware program that ... «Techworld.com, May 15»
Proof-of-concept GPU rootkit hides in VRAM, snoops system activities
A team of coders have published a new “educational” rootkit, dubbed Jellyfish, that's virtually undetectable by current software practices. Their work is designed ... «ExtremeTech, May 15»
Sneaky Linux malware comes with sophisticated custom-built rootkit
A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that's custom built for ... «PCWorld, Feb 15»
Thunderstrike - new Mac "ueberrootkit" could own your Apple forever
Generally speaking, any rootkit installed or activated at stage 3 or 4 above can be detected using regular and well-documented programming techniques. «Naked Security, Jan 15»
Researchers expect surge of rootkits targeting 64-bit PCs
Following a downward trend during the past two years, the number of new rootkit samples rose in the first quarter of this year to a level not seen since 2011, ... «PCWorld, Jun 14»
Anti-virus firm finds alleged Kremlin cyberweapon, undetected for at …
But what makes the Uroburos rootkit stand out from the crowd is that G Data's detailed report into the malware reveals that their researchers believe it to have ... «Graham Cluley Security News, Mar 14»
Gameover malware tougher to kill with new rootkit component
A new variant of the Gameover malware that steals online banking credentials comes with a kernel-level rootkit that makes it significantly harder to remove, ... «PCWorld, Feb 14»
Is this Russia's Stuxnet? Security firm spots suspicious 'Uroburos …
'Uroburos' is an advanced rootkit that has been infecting networks since as far back as 2011, quietly stealing data after setting up rogue P2P networks within its ... «Techworld.com, Feb 14»
New version of Gozi financial malware bundles MBR rootkit
Sophisticated malware that uses MBR rootkit components, like TDL4, also known as Alureon or TDSS, are part of the reason why Microsoft built the Secure Boot ... «PCWorld, Apr 13»